Cisco Final Practice
A network administrator is variably subnetting a given block of IPv4 addresses. Which combination of network addresses and prefix lengths will make the most efficient use of addresses when the need is for 2 subnets capable of supporting 10 hosts and 1 subnet that can support 6 hosts?
10.1.1.128/28 10.1.1.144/28 10.1.1.160/29
Which keys act as a hot key combination that is used to interrupt an IOS process?
2001:DB8:0:AB00::1234
Given IPv6 address prefix 2001:db8::/48, what will be the last subnet that is created if the subnet prefix is changed to /52?
2001:db8:0:f00::/52
what will be the result of failed attempts if the following command is entered into a router? login block-for 150 attempts 4 with 90
All login attempts will be blocked for 4 hours if there are 90 failed attempts within 150 seconds. All login attempts will be blocked for 150 seconds if there are 4 failed attempts within 90 seconds. All login attempts will be blocked for 1.5 hours if there are 4 failed attempts within 150 seconds. All login attempts will be blocked for 90 seconds if there are 4 failed attempts within 150 seconds.
Which two services are required to enable a computer to receive dynamic IP addresses and access the Internet using domain names?
D N S WINS
What will a Layer 2 switch do when the destination MAC address of a received frame is not in the MAC table?
It broadcasts the frame out of all ports on the switch. It initiates an ARP request. It forwards the frame out of all ports except for the port at which the frame was received. It notifies the sending host that the frame cannot be delivered.
Which statement describes a characteristic of the traceroute utility?
It is primarily used to test connectivity between two hosts. It sends four Echo Request messages. It utilizes the ICMP Source Quench messages. It identifies the routers in the path from a source host to a destination host.
common format
Presentation
compression
Presentation
Which two statements correctly describe a router memory type and its contents? (Choose two.)
RAM is volatile and stores the IP routing table. ROM is nonvolatile and contains basic diagnostic software.
What type of communication rule would best describe CSMA/CD?
access method
HTTP and FTP
application layer
routing
application layer
What three services are provided by the transport layer? (Choose three.)
connection establishment error recovery flow control
Which two automatic addressing assignments are supported by DHCPv4? (Choose two.)
default gateway subnet mask
Protect the network from unauthorized access.
fault tolerance? scalability? security? NOT all are used to options on left
What PDU is associated with the transport layer?
frame
Refer to the exhibit. A network administrator is configuring access control to switch SW1. If the administrator uses Telnet to connect to the switch, which password is needed to access user EXEC mode?
letmein / where is exec modes****
Which two OSI model layers are considered to be included in the top layer of the TCP/IP protocol stack? (Choose two.)
network transport
What is a basic characteristic of the IP protocol?
reliable end-to-end delivery
dialog maintenance:
session layer
In addition to the cable length, what two factors could interfere with the communication carried over UTP cables? (Choose two.)
size of the network signal modulation technique electromagnetic interference bandwidth crosstalk
An author is uploading one chapter document from a personal computer to a file server of a book publisher. What role is the personal computer assuming in this network model?
slave transient master server client
What is the purpose of ICMP messages?
to provide feedback of IP packet transmissions
Switch1> confid t: Refer to the exhibit. An administrator is trying to configure the switch but receives the error message that is displayed in the exhibit. What is the problem?
The entire command, configure terminal, must be used. The administrator must connect via the console port to access global configuration mode. The administrator is already in global configuration mode. The administrator must first enter privileged EXEC mode before issuing the command.